Results 271 to 280 of about 1,175,680 (325)
Some of the next articles are maybe not open access.

Cyber Threats

2017
The development of the internet and digital technologies represent a major opportunity for the UK, transforming businesses and providing new tools for everyday communication. More than 80 per cent of households in the UK now have an internet connection and internet users are spending increasing amounts of time online, undertaking a greater range of ...
openaire   +1 more source

Cyber Threats

2018
Abstract Cyber threats have become a pre-eminent concern in international affairs. The security of cyberspace has become a condition of the survival of modern societies; yet the scale of the threats grows only larger with time. Some states have turned to the UN system to address cyber issues. These efforts are of two general sorts.
openaire   +1 more source

Cyber Threat

2016
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of
openaire   +1 more source

Impact of Factors Influencing Cyber Threats on Autonomous Vehicles

Applied Artificial Intelligence, 2020
Advanced Technologies are transforming the Automotive industry and the pace of innovation is accelerating at a breakneck speed. Autonomous Vehicles (AVs) incorporate many different systems and technologies and their increased computer functionality and ...
A. Seetharaman   +4 more
semanticscholar   +1 more source

Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise

Conference on Computer and Communications Security, 2019
Conventional attacks of insider employees and emerging APT are both major threats for the organizational information system. Existing detections mainly concentrate on users' behavior and usually analyze logs recording their operations in an information ...
Fucheng Liu   +5 more
semanticscholar   +1 more source

Cyber threat panel

2012 Integrated Communications, Navigation and Surveillance Conference, 2012
Presents a collection of slides from the author's conference presentation. Topics covered include: Information assurance & the risk equation; Advanced persistant threats (APTs) The threat of mobility to the US FAA.
openaire   +1 more source

Cyber Security Threats, Cyber Terrorism, Cyber Warfare

The chapter delves into the multifaceted landscape of cyber threats, emphasizing the critical need for robust security measures in the face of escalating cyber terrorism and warfare. Beginning with an exploration of the evolving nature of cyber threats, the chapter elucidates the various forms of cyber-attacks that pose significant risks to individuals,
Pankaj Bhambri, Alex Khang
openaire   +1 more source

Potential cyber threats of adversarial attacks on autonomous driving models

Journal of Computer Virology and Hacking Techniques, 2023
E. Boltachev
semanticscholar   +1 more source

Cyber threat landscape in cyber space

2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), 2017
As technology rises in innovation and proliferation in the present times, with everyday life melding into the digital realm, so too rise the dangers and threats that such a digital dimension presents. In an age where cyber space has become so synced with physical lives, we must learn the need for cyber security and endeavor to propagate awareness for ...
Anusha Kadambari Shanker, G. Usha
openaire   +1 more source

Addressing cyber threats

2012
The authors concentrate on the cooperation of organisations - from government and the market sector - to address cyber threats. They discern three network action models that respectively deal with organisations' routine wrestling to fight every day's attacks on digital systems, a possible disruption of critical infrastructure and a major security ...
van Fenema, P.C., Soeters, J.M.M.L.
openaire   +1 more source

Home - About - Disclaimer - Privacy